Bug 1897679
| Summary: | acpica-tools-20210604 is available | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | Upstream Release Monitoring <upstream-release-monitoring> | ||||||||||
| Component: | acpica-tools | Assignee: | Al Stone <ahs3> | ||||||||||
| Status: | CLOSED ERRATA | QA Contact: | Fedora Extras Quality Assurance <extras-qa> | ||||||||||
| Severity: | medium | Docs Contact: | |||||||||||
| Priority: | medium | ||||||||||||
| Version: | rawhide | CC: | ahs3 | ||||||||||
| Target Milestone: | --- | Keywords: | FutureFeature, Triaged | ||||||||||
| Target Release: | --- | ||||||||||||
| Hardware: | Unspecified | ||||||||||||
| OS: | Unspecified | ||||||||||||
| Whiteboard: | |||||||||||||
| Fixed In Version: | acpica-tools-20210604-1.fc34 | Doc Type: | If docs needed, set a value | ||||||||||
| Doc Text: | Story Points: | --- | |||||||||||
| Clone Of: | Environment: | ||||||||||||
| Last Closed: | 2021-07-22 01:13:54 UTC | Type: | --- | ||||||||||
| Regression: | --- | Mount Type: | --- | ||||||||||
| Documentation: | --- | CRM: | |||||||||||
| Verified Versions: | Category: | --- | |||||||||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||||||||
| Embargoed: | |||||||||||||
| Attachments: |
|
||||||||||||
|
Description
Upstream Release Monitoring
2020-11-13 18:24:28 UTC
Created attachment 1729206 [details]
[patch] Update to 20201113 (#1897679)
Latest upstream release: 20201217 Current version/release in rawhide: 20200925-1.fc34 URL: https://www.acpica.org/downloads Please consult the package updates policy before you issue an update to a stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/ More information about the service that created this bug can be found at: https://fedoraproject.org/wiki/Upstream_release_monitoring Please keep in mind that with any upstream change, there may also be packaging changes that need to be made. Specifically, please remember that it is your responsibility to review the new version to ensure that the licensing is still correct and that no non-free or legally problematic items have been added upstream. Based on the information from anitya: https://release-monitoring.org/project/18/ Created attachment 1740067 [details]
[patch] Update to 20201217 (#1897679)
Latest upstream release: 20210105 Current version/release in rawhide: 20200925-1.fc34 URL: https://www.acpica.org/downloads Please consult the package updates policy before you issue an update to a stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/ More information about the service that created this bug can be found at: https://fedoraproject.org/wiki/Upstream_release_monitoring Please keep in mind that with any upstream change, there may also be packaging changes that need to be made. Specifically, please remember that it is your responsibility to review the new version to ensure that the licensing is still correct and that no non-free or legally problematic items have been added upstream. Based on the information from anitya: https://release-monitoring.org/project/18/ Created attachment 1744691 [details]
[patch] Update to 20210105 (#1897679)
the-new-hotness/release-monitoring.org's scratch build of acpica-tools-20210105-1.fc32.src.rpm for rawhide failed http://koji.fedoraproject.org/koji/taskinfo?taskID=58995515 Latest upstream release: 20210331 Current version/release in rawhide: 20200925-2.fc34 URL: https://www.acpica.org/downloads Please consult the package updates policy before you issue an update to a stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/ More information about the service that created this bug can be found at: https://fedoraproject.org/wiki/Upstream_release_monitoring Please keep in mind that with any upstream change, there may also be packaging changes that need to be made. Specifically, please remember that it is your responsibility to review the new version to ensure that the licensing is still correct and that no non-free or legally problematic items have been added upstream. Based on the information from anitya: https://release-monitoring.org/project/18/ An HTTP error occurred downloading the package's new Source URLs: Getting https://acpica.org/sites/acpica/files/acpitests-unix-20210331.tar.gz to ./acpitests-unix-20210331.tar.gz Latest upstream release: 20210604 Current version/release in rawhide: 20200925-2.fc34 URL: https://www.acpica.org/downloads Please consult the package updates policy before you issue an update to a stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/ More information about the service that created this bug can be found at: https://fedoraproject.org/wiki/Upstream_release_monitoring Please keep in mind that with any upstream change, there may also be packaging changes that need to be made. Specifically, please remember that it is your responsibility to review the new version to ensure that the licensing is still correct and that no non-free or legally problematic items have been added upstream. Based on the information from anitya: https://release-monitoring.org/project/18/ Created attachment 1789024 [details]
[patch] Update to 20210604 (#1897679)
the-new-hotness/release-monitoring.org's scratch build of acpica-tools-20210604-1.fc32.src.rpm for rawhide failed http://koji.fedoraproject.org/koji/taskinfo?taskID=69336885 FEDORA-2021-a25c63e85d has been submitted as an update to Fedora 34. https://bodhi.fedoraproject.org/updates/FEDORA-2021-a25c63e85d FEDORA-2021-a25c63e85d has been pushed to the Fedora 34 testing repository. Soon you'll be able to install the update with the following command: `sudo dnf upgrade --enablerepo=updates-testing --advisory=FEDORA-2021-a25c63e85d` You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2021-a25c63e85d See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates. FEDORA-2021-a25c63e85d has been pushed to the Fedora 34 stable repository. If problem still persists, please make note of it in this bug report. |